Abstract

Cloud computing services have great convenience, but privacy security is a big obstacle of popularity. In the process result of privacy protection of cloud computing, it is difficult to choose the optimal strategy. In order to solve this problem, we propose a quantitative weight model of privacy information, use evolutionary game theory to establish a game model of attack protection, design the optimal protection strategy selection algorithm, and make the evolutionary stable equilibrium solution method from the limited rational constraint. In order to study the strategic dependence of the same game group, the classical dynamic replication equation is improved by using the incentive coefficient, an improved evolutionary game model of attack protection is constructed, the stability of equilibrium point is further analyzed by Jacobian matrix method, and the optimal selection strategy is obtained under different conditions. Finally, the correctness and validity of the model are verified by experiments, different strategies of the same group have the dual effects of promotion and inhibition, and the advantages of this paper are shown by comparing with other articles.

Highlights

  • With the development of information technology, the scale of the network is becoming more and more complex, and the serious privacy leak events cause tremendous harm to cloud computing [1]

  • The main contributions of our paper are as follows: Security and Communication Networks (i) We propose a quantitative weight model of privacy information, construct an evolutionary game model of attack-protect, make an evolutionary stable strategy solution method, achieve the optimal privacy strategy selection, and analyze the different evolutionary stable equilibrium (ii) To express the strategic dependence, we propose improving the accuracy of the replication dynamic equation by incentive coefficients, construct an improved evolutionary game model of cloud computing privacy protection, and give the detailed process of equilibrium solution (iii) We use the Jacobian matrix method to analyze the stability of the game equilibrium point and the evolutionary trend of the game and obtain the optimal protect strategy e structure of this paper is as follows

  • In terms of application scenarios, both the behavior analysis of cloud computing networks and the dynamic research of privacy security are based on strategy selection, which makes the research on strategy selection more universal. e game is a continuous process, different strategies in the same group have a great impact on the game results, but there are few researches in these above articles

Read more

Summary

Introduction

With the development of information technology, the scale of the network is becoming more and more complex, and the serious privacy leak events cause tremendous harm to cloud computing [1]. 2. Related Work e main security privacy strategy technologies for cloud system can be classified into three categories: attack defense game, evolution game, and strategy selection. Du et al [19] used the evolutionary game theory framework of community to analyze the privacy protection behavior of the social network and designed incentives based on cost performance. In order to study heterogeneous network system and provide the optimal security detection strategy, Wu et al [22] gave the analysis of Bayesian equilibrium and robust Nash equilibrium with incomplete information and proposed a verification and calculation method for continuous kernels. Improved evolutionary game of attack-protect model for cloud privacy strategy selection. Experiment simulation 2 of improved game of attack-protect with incentive coefficients

Analysis and discussion of simulation result
A Game Model of Attack-Protect
Findings
Experiment Simulation and Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call